cve/2022/CVE-2022-0732.md

26 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-0732](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0732)
![](https://img.shields.io/static/v1?label=Product&message=Copy9&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ExactSpy&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FoneTracker&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=GuestSpy&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MxSpy&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SecondClone&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=The%20Truth%20Spy&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TheSpyApp&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=iSpyoo&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%20Improper%20Access%20Control&color=brighgreen)
### Description
The backend infrastructure shared by multiple mobile device monitoring services does not adequately authenticate or authorize API requests, creating an IDOR (Insecure Direct Object Reference) vulnerability.
### POC
#### Reference
- https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/
#### Github
No PoCs found on GitHub currently.